Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 16:17
Static task
static1
Behavioral task
behavioral1
Sample
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
Resource
win10v2004-20220812-en
General
-
Target
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
-
Size
389KB
-
MD5
f681b4a16bed5f6269aee217c6cd1222
-
SHA1
1d6ebeb45311492380202ea0f1bb9c3cb6bd9880
-
SHA256
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423
-
SHA512
f0543be85146c34312f8014030a83aa00f82e55a63a09d7d55ad2310ade7030f188dfca4ce0b66cc5c636e6d55dcf46673ca71e3900ef79a1ae3964a4c8c4a6f
-
SSDEEP
12288:V17lp2D7gWtUSvuWZJf34myr2H/BRGbmaROU:VVSsEf38risLR
Malware Config
Extracted
hancitor
2502_ser3402
http://speritentz.com/8/forum.php
http://afternearde.ru/8/forum.php
http://counivicop.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid Process 31 700 rundll32.exe 33 700 rundll32.exe 35 700 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 700 rundll32.exe 700 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1232 wrote to memory of 700 1232 rundll32.exe 78 PID 1232 wrote to memory of 700 1232 rundll32.exe 78 PID 1232 wrote to memory of 700 1232 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:700
-